Obfuscated Code Detection -- Analyzing Memory Accesses in Obfuscated x86 Executables -- Hybrid Engine for Polymorphic Shellcode Detection -- Honeypots -- Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities -- A Pointillist Approach for Comparing Honeypots -- Vulnerability Assessment and Exploit Analysis -- Automatic Detection of Attacks on Crypt…
Wireless LAN -- Security I -- TCP and Congestion Control -- Wireless Ad Hoc Network Routing -- Network Measurement -- Routing -- Power Control in Wireless Networks -- QoS I -- High Speed Networks -- Wireless Networks I -- QoS II -- Wireless Ad Hoc Networks -- Network Design -- Peer to Peer Networks -- QoS III -- Security II -- Wireless Networks II -- Applications and Services -- Security III --…
Broadband Satellite Multimedia (BSM) Architectures -- Satlabs Group: Leading the DVB-RCS Standard to a Commercial Success -- COST272: Packet-Oriented Service Delivery Via Satellites -- Removing Barriers, Integrating Research, Spreading Excellence: The European Satellite Communications Network of Excellence “SatNEx” -- Integrating Satellite Digital Radio Broadcasting (S-DB), Terrestrial Cell…
Motivating Scenarios -- Attacks -- Foundations -- Design Challenges -- Platform Architecture -- Outbound Authentication -- Validation -- Application Case Studies -- TCPA/TCG -- Experimenting with TCPA/TCG -- New Horizons.How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial effor…
Computational Intelligence -- An Approach for Conceptual Modeling and Extracting Expressive Semantics from Dance Videos -- BioPubMiner: Machine Learning Component-Based Biomedical Information Analysis Platform -- A Linear Time Algorithm for Constructing Tree 4-Spanner in 2-Trees -- Task Scheduling Algorithm for Interconnection Constrained Network of Heterogeneous Processors -- Neural Networks -…
Keynote Speech -- Track 1: Network Protocols, Routing, Algorithms -- Track 2: Languages and Compilers for HPC -- Track 3: Parallel/Distributed System Architectures -- Track 4: Embedded Systems -- Track 5: Parallel/Distributed Algorithms -- Track 6: Wireless and Mobile Computing -- Track 7: Web Services and Internet Computing -- Track 8: Peer-to-Peer Computing -- Track 9: Grid and Cluster Comput…
Session 1: Mobility Management -- Impact of Link State Changes and Inaccurate Link State Information on Mobility Support and Resource Reservations -- Comparison of Signaling and Packet Forwarding Overhead for HMIP and MIFA -- Profile System for Management of Mobility Context Information for Access Network Selection and Transport Service Provision in 4G Networks -- Replic8: Location-Aware Data R…
Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications -- An Improvement on Privacy and Authentication in GSM -- Encrypted Watermarks and Linux Laptop Security -- Inconsistency Detection of Authorization Policies in Distributed Component Environment -- Public Key Schemes I -- Custodian-Hiding Verifiable Encryption -- Proving Key Usage -- Public Key Enc…
Keynote Papers -- Session 1: Classification and Clustering -- Session 2: Topic and Concept Discovery -- Session 3: Text Search and Document Generation -- Session 4: Web Search -- Session 5: Mobile and P2P -- Session 6: XML (1) -- Session 7: XML (2) -- Session 8: Integration and Collaboration -- Session 9: Data Mining and Analysis -- Session 10: Web Browsing and Navigation -- Session 11: Spatial…
1: Large Scale Computations -- Large Scale Simulations -- Development and Integration of Parallel Multidisciplinary Computational Software for Modeling a Modern Manufacturing Process -- Automatically Tuned FFTs for BlueGene/L’s Double FPU -- A Survey of High-Quality Computational Libraries and Their Impact in Science and Engineering Applications -- A Performance Evaluation of the Cray X1 for …